Installing and using the webscurity webapp.secure client



Similar documents
Platform LSF Version 9 Release 1.2. Migrating on Windows SC

IBM Security QRadar Version (MR1) Checking the Integrity of Event and Flow Logs Technical Note

IBM Security QRadar Version (MR1) Replacing the SSL Certificate Technical Note

Tivoli IBM Tivoli Monitoring for Transaction Performance

IBM Cognos Controller Version New Features Guide

Release Notes. IBM Tivoli Identity Manager Oracle Database Adapter. Version First Edition (December 7, 2007)

IBM Enterprise Marketing Management. Domain Name Options for

Linux. Managing security compliance

Packet Capture Users Guide

IBM Security QRadar Version Installing QRadar with a Bootable USB Flash-drive Technical Note

Tivoli Endpoint Manager for Security and Compliance Analytics. Setup Guide

IBM Enterprise Marketing Management. Domain Name Options for

IBM Rational Rhapsody NoMagic Magicdraw: Integration Page 1/9. MagicDraw UML - IBM Rational Rhapsody. Integration

Version 8.2. Tivoli Endpoint Manager for Asset Discovery User's Guide

Tivoli Security Compliance Manager. Version 5.1 April, Collector and Message Reference Addendum

IBM Security QRadar Version (MR1) Configuring Custom Notifications Technical Note

IBM Security QRadar Version Common Ports Guide

Remote Support Proxy Installation and User's Guide

IBM Configuring Rational Insight and later for Rational Asset Manager

IBM SmartCloud Analytics - Log Analysis. Anomaly App. Version 1.2

IBM Cognos Controller Version New Features Guide

IBM VisualAge for Java,Version3.5. Remote Access to Tool API

IBM Security SiteProtector System Migration Utility Guide

IBM Tivoli Web Response Monitor

Installing on Windows

Getting Started With IBM Cúram Universal Access Entry Edition

Tivoli Endpoint Manager for Security and Compliance Analytics

Implementing the End User Experience Monitoring Solution

Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management

Sametime Version 9. Integration Guide. Integrating Sametime 9 with Domino 9, inotes 9, Connections 4.5, and WebSphere Portal

Patch Management for Red Hat Enterprise Linux. User s Guide

IBM FileNet System Monitor FSM Event Integration Whitepaper SC

IBM Security SiteProtector System Configuring Firewalls for SiteProtector Traffic

IBM Proventia Management SiteProtector. Configuring Firewalls for SiteProtector Traffic Version 2.0, Service Pack 8.1

IBM TRIRIGA Anywhere Version 10 Release 4. Installing a development environment

IBM WebSphere Message Broker - Integrating Tivoli Federated Identity Manager

IBM FlashSystem. SNMP Guide

S/390 Virtual Image Facility for LINUX Guide and Reference

IBM Lotus Protector for Mail Encryption. User's Guide

Rapid Data Backup and Restore Using NFS on IBM ProtecTIER TS7620 Deduplication Appliance Express IBM Redbooks Solution Guide

IBM Security QRadar Version (MR1) Installing QRadar 7.1 Using a Bootable USB Flash-Drive Technical Note

IBM Endpoint Manager Version 9.2. Software Use Analysis Upgrading Guide

webapp.secure Installation and Setup Guide

Remote Control Tivoli Endpoint Manager - TRC User's Guide

Integrating ERP and CRM Applications with IBM WebSphere Cast Iron IBM Redbooks Solution Guide

Redbooks Paper. Local versus Remote Database Access: A Performance Test. Victor Chao Leticia Cruz Nin Lei

Tivoli Endpoint Manager for Configuration Management. User s Guide

z/os V1R11 Communications Server system management and monitoring

IBM PowerSC Technical Overview IBM Redbooks Solution Guide

IBM Endpoint Manager. Security and Compliance Analytics Setup Guide

OS Deployment V2.0. User s Guide

QLogic 4Gb Fibre Channel Expansion Card (CIOv) for IBM BladeCenter IBM BladeCenter at-a-glance guide

IBM TRIRIGA Version 10 Release 4.2. Inventory Management User Guide IBM

Disaster Recovery Procedures for Microsoft SQL 2000 and 2005 using N series

Rational Build Forge. AutoExpurge System. Version7.1.2andlater

Table 1 shows the LDAP server configuration required for configuring the federated repositories in the Tivoli Integrated Portal server.

IBM TRIRIGA Application Platform Version Reporting: Creating Cross-Tab Reports in BIRT

InfoPrint 4247 Serial Matrix Printers. Remote Printer Management Utility For InfoPrint Serial Matrix Printers

Database lifecycle management

QLogic 8Gb FC Single-port and Dual-port HBAs for IBM System x IBM System x at-a-glance guide

IBM Financial Transaction Manager for ACH Services IBM Redbooks Solution Guide

IBM Endpoint Manager for OS Deployment Windows Server OS provisioning using a Server Automation Plan

IBM DB2 Data Archive Expert for z/os:

Big Data Analytics with IBM Cognos BI Dynamic Query IBM Redbooks Solution Guide

IBM Enterprise Content Management Software Requirements

WebSphere Application Server V6: Diagnostic Data. It includes information about the following: JVM logs (SystemOut and SystemErr)

CS z/os Network Security Configuration Assistant GUI

WebSphere Business Modeler Advanced. Defining metrics and KPIs to monitor your business

Cúram Business Intelligence and Analytics Guide

z/os V1R11 Communications Server System management and monitoring Network management interface enhancements

IBM Lotus Protector for Mail Encryption

IBM DB2 for Linux, UNIX, and Windows. Deploying IBM DB2 Express-C with PHP on Ubuntu Linux

Broadcom NetXtreme Gigabit Ethernet Adapters IBM Redbooks Product Guide

IBM Connections Plug-In for Microsoft Outlook Installation Help

Release 7.1 Installation Guide

Performance of a webapp.secure Environment

Endpoint Manager for Mobile Devices Setup Guide

IBM RDX USB 3.0 Disk Backup Solution IBM Redbooks Product Guide

Omnibus Dashboard Best Practice Guide and Worked Examples V1.1

WebSphere Business Compass Version 7. Getting started with process maps

Active Directory Synchronization with Lotus ADSync

IBM Cloud Orchestrator Content Pack for OpenLDAP and Microsoft Active Directory Version 2.0. Content Pack for OpenLDAP and Microsoft Active Directory

CS z/os Application Enhancements: Introduction to Advanced Encryption Standards (AES)

Case Study: Process SOA Scenario

IBM. Job Scheduler for OS/400. AS/400e series. Version 4 SC

FileNet Integrated Document Management Technical Bulletin

Communications Server for Linux

Rational Developer for IBM i (RDI) Distance Learning hands-on Labs IBM Rational Developer for i. Maintain an ILE RPG application using

IBM Lotus Protector for Mail Encryption

IBM WebSphere Adapter for PeopleSoft Enterprise Quick Start Tutorials

Redpaper. IBM Workplace Collaborative Learning 2.5. A Guide to Skills Management. Front cover. ibm.com/redbooks. Using the skills dictionary

IBM Endpoint Manager for Software Use Analysis Version 9 Release 0. Customizing the software catalog

IBM z13 for Mobile Applications

IBM Client Security Solutions. Password Manager Version 1.4 User s Guide

IBM Endpoint Manager Version 9.0. Patch Management for Red Hat Enterprise Linux User's Guide

Creating Applications in Bluemix using the Microservices Approach IBM Redbooks Solution Guide

Getting Started with IBM Bluemix: Web Application Hosting Scenario on Java Liberty IBM Redbooks Solution Guide

Continuous access to Read on Standby databases using Virtual IP addresses

Sterling Supplier Portal. Overview Guide. DocumentationDate:9June2013

Transcription:

Linux Utilities for IBM System z Installing and using the webscurity webapp.secure client SC33-8322-00

Linux Utilities for IBM System z Installing and using the webscurity webapp.secure client SC33-8322-00

Note Before using this information and the product it supports, read the information in Notices, on page 19. First Edition (August 2006) Copyright International Business Machines Corporation 2006. All rights reserved. US Government Users Restricted Rights Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.

Contents About this book........... v Chapter 1. Overview......... 1 Chapter 2. Pre-requisites....... 3 Chapter 3. Installation......... 5 Chapter 4. Configuration....... 7 Initialization..............8 Testing the configuration..........8 Backing up the configuration.........8 Chapter 6. Security......... 11 Chapter 7. Data integrity considerations........... 13 Chapter 8. Tuning.......... 15 Chapter 9. Service and upgrade.... 17 Obtaining updates............17 Appendix. Notices.......... 19 Trademarks..............20 Chapter 5. Operation......... 9 User interface..............9 Copyright IBM Corp. 2006 iii

iv Installing and using webapp.secure

About this book This document describes how to set up and use the webscurity webapp.secure component in the context of Linux Utilities for IBM System z (Linux Utilities). Linux Utilities are a suite of Linux solutions configured and tested on System z in a z/os and Linux workload scenario. Linux Utilities provide specific infrastructure functions that are complementary to functions on z/os. With Linux Utilities you have an additional option to optimize your z/os environment. Linux Utilities help to provide quick deployment, easy installation, and reduced time-to-market of infrastructure functions with minimal impact on z/os skills and resources. For more information on Linux Utilities visit www.ibm.com/zseries/os/linux/ utilities. On this site you might also find updates to this document. For information on running Linux on System z mainframes see: v z/vm and Linux on IBM System z: The Virtualization Cookbook for SLES9, SG24-6695 v z/vm and Linux on IBM System z: The Virtualization Cookbook for Red Hat Enterprise Linux 4, SG24-7272 Copyright IBM Corp. 2006 v

vi Installing and using webapp.secure

Chapter 1. Overview The webscurity webapp.secure client for Linux on System z protects web application servers running on IBM systems under z/os from web application attacks which take advantage of the stateless nature of the Web protocol (HTTP). The client stops indiscriminate HTTP worm or virus attacks, and also discriminate targeted Internet attacks directed at the application source code. Even when protected by a general firewall, web applications are still vulnerable to critical attacks such as SQL injection, cross-site scripting, cookie poisoning, hidden field manipulation, and others. The webscurity webapp.secure client operates invisibly and protects the application by examining the HTTP network traffic to ensure that it conforms to Intended Use Guidelines specified for the site. The functions provided by the utility include: v Provision of a trusted gateway that protects all web application code, z/os, WebSphere or other middleware and their vulnerabilities, v Checking of web content in the de-militarised zone (DMZ) with no risk to the application servers running on z/os, v Set & Forget controls that autonomically derive and update policy, v An added layer of regulatory compliance that exceeds government guidelines for GLBA, HIPAA and SOX, v Isolation of z/os from Internet traffic and threats, using HiperSockets for fast communications that are physically secure. As shown in Figure 1, webapp.secure runs in the DMZ between the external firewall and the Linux web proxy. After the packaging of network traffic has been verified by the external firewall, and before the traffic is passed through the internal firewall to the z/os application, the contents of the traffic are verified by webapp.secure. Internet System z Firewall DMZ Linux Web server z/os Transaction server webapp.secure Firewall Figure 1. Base scenario Copyright IBM Corp. 2006 1

This can be used as a starting point in the transition from the distributed environment, but the maximum benefits from webapp.secure can be gained in an environment such as that illustrated in Figure 2. Here the necessary firewall functions are performed by IPSec and IPS in the z/os TCP/IP stack. In this way the complexity and expense of the choke or private firewall can be eliminated and increased performance will result. Internet System z Firewall DMZ Linux Web server z/os Transaction server webapp.secure IPSec/IPS Figure 2. Advanced scenario 2 Installing and using webapp.secure

Chapter 2. Pre-requisites This section identifies pre-requisites for the webscurity webapp.secure client for Linux on System z. v The utility must be installed into Linux on System z running in an LPAR or under z/vm. v System Requirements Compatibility All major web browsers All HTTP web servers All HTTP application servers Fully compatible with HTTP 1.0 and 1.1 Fully compatible with HTML 3.2 and 4.0, including cascading style sheets Fully compatible with client side scripting languages (JavaScript, VBScript, etc.) SSL 40/128 bit encryption and global ID v System Requirements Minimum 128 Mbytes RAM recommended 300 Mbytes free disk space recommended v If you host multiple web sites on the same server using IP-based virtual hosting, then you will need to set up a separate instance for each IP. Set the <listen-ip> property (see Chapter 4, Configuration, on page 7) of each instance to the IP address of each web site. Check Obtaining updates on page 17 for the latest version of the webapp.secure client. Copyright IBM Corp. 2006 3

4 Installing and using webapp.secure

Chapter 3. Installation Installation of the webscurity webapp.secure client on System z As the webscurity webapp.secure client runs entirely on Linux there is nothing to install on z/os. The Linux software is supplied as a RPM package, for example webapp.secure.pe-3.0-1.s390x.rpm. This is installed in Linux on System z using the rpm -i command. Full details are given in the webapp.secure Installation and Setup Guide, http://www.webscurity.com/pdfs/wa_installation_setup_guide.pdf. More information about installation on Linux or UNIX is contained in the document /usr/local/wa/doc/welcome_unix.pdf which is installed as part of the RPM package. Copyright IBM Corp. 2006 5

6 Installing and using webapp.secure

Chapter 4. Configuration How to configure webapp.secure on z/os and on Linux on System z. Configuration on z/os will generally be unnecessary. The only exception would be if webapp.secure is required to monitor web access originating in z/os. In this case it is necessary to modify the routing table on z/os to direct the net traffic through the webapp.secure client. The original routing table entries are used in the configuration of the utility on Linux. The webscurity webapp.secure client is configured on Linux in a set of XML files which are maintained with the use of a text editor such as vi. The first of these files is the locations file, etc/wa.conf. This file holds a pointer to the main configuration settings in properties_file, as well as pointers to log files and flags for log settings. Basic details are given in the section To Install webapp.secure on Linux in the webapp.secure Installation and Setup Guide, http:// www.webscurity.com/pdfs/wa_installation_setup_guide.pdf. The default location for the properties file is /usr/local/wa/etc/waproperties.xml. The principle entries in this file are the web-server-name, web-server-port, listenport, and host-name which identify the web server to be protected. Other entries may be added to define policies and detection settings. The formats of the principal entries are: Web Server Name <web-server-name>server_ip_address</web-server-name> for example: <web-server-name>our.server</web-server-name> or: <web-server-name>192.168.0.2</web-server-name> This is the internal reference of the web server webapp.secure is protecting. It is typically an IP address or an internal server name. Web Server Port <web-server-port>server_port</web-server-port> for example: <web-server-port>8080</web-server-port> If webapp.secure is running on the physical web server this should be a non-standard port number. However, if they are running on separate machines, this can be any valid TCP port number not accessible from the outside. Listen IP <listen-ip>ip_to_monitor</listen-ip> for example: <listen-ip>192.168.0.2</listen-ip> Copyright IBM Corp. 2006 7

This is an optional IP address that webapp.secure should use. If no IP is specified, webapp.secure will use all available. Listen Port <listen-port>normal_port</listen-port> for example: <listen-port>80</listen-port> This is the TCP port number webapp.secure will use for unencrypted traffic. Normally this will be the standard HTTP port 80. Host Names <host-names> <host-name>host</host-name> <host-names> for example: <host-names> <host-name>www.maindomain.com</host-name> <host-name>www.subdomain.com</host-name> <host-names> These are one or more fully-qualified external host names of the web sites webapp.secure is protecting. Add an entry for every name-based virtual web site hosted on the web server. Full details of these fields and other configuration settings are given in the document Welcome to webapp.secure, /usr/local/wa/doc/welcome_unix.pdf. Initialization Testing the configuration The webapp.secure process is started with the command /usr/local/wa/bin/wa. This will normally be added to a system boot procedure. No further initialization is required. Backing up the configuration Testing that the webscurity webapp.secure client has been successfully configured. The configuration can be tested by following the examples given in the Testing/Experimenting section of the webapp.secure Installation and Setup Guide, http://www.webscurity.com/pdfs/wa_installation_setup_guide.pdf, and the Evaluation Installation Examples section in the Welcome to webapp.secure document, /usr/local/wa/doc/welcome_unix.pdf. Backing up the configuration settings of the webscurity webapp.secure client The configuration settings are held in text format in an XML file and a conf file (see Chapter 4, Configuration, on page 7 for details.) This file should be backed up by copying it to a secure location whenever it is modified. Restoration is simply a matter of copying it back again. 8 Installing and using webapp.secure

Chapter 5. Operation How to use the webscurity webapp.secure client webapp.secure operates invisibly in the System z DMZ, by protecting each URL within a System z machine with Set & Forget controls that autonomically derive and update web site policy as content exits the web server. The webapp.secure Administration Console records and reports statistics for all HTTP daemon requests, showing total allowed and total blocked by attack attempt type. User interface The webscurity webapp.secure client for Linux on System z is controlled using the browser-based Administration Option. Example screens from the Administration Option can be found from the http://www.webscurity.com/products.htm page, by following the Quick Start Guide link. The Remote Administration property group allows you to specify parameters for browser-based administration. There are safeguards to limit accessibility to the remote administration feature, and it does use SSL (https://), but it was designed to be used over an intranet. The parameters are: <remote-admin> <enable>status</enable> </remote-admin> for example: <remote-admin> <enable>true</enable> </remote-admin> Set to True to enable browser-based administration. <remote-admin> <listen-ip>ip_to_monitor</listen-ip> </remote-admin> for example: <remote-admin> <listen-ip>192.168.0.2</listen-ip> </remote-admin> This is the specific IP address webapp.secure should use for browser-based administration. If left blank all available IP addresses will be used. <remote-admin> <listen-port>normal_port</listen-port> </remote-admin> for example: Copyright IBM Corp. 2006 9

<remote-admin> <listen-port>8020</listen-port> </remote-admin> This is the TCP port number webapp.secure should use for browser-based administration. <remote-admin> <password>password</password> </remote-admin> for example: <remote-admin> <password>admin</password> </remote-admin> This is a one-way hashed password to use for browser-based administration access. Note: The default password is admin and can only be changed from the browser when this option is enabled. <remote-admin> <client-ips> <client-ip>client_ip</client-ip> </client-ips> </remote-admin> for example: <remote-admin> <client-ips> <client-ip>192.168.0.105</client-ip> </client-ips> </remote-admin> These are one or more client IP addresses that are allowed to connect to webapp.secure for browser-based administration. If no IPs are specified connections will be accepted from any IP address. Example addressing from a browser: https://192.168.0.2:8020/ (Please note the use of https in this example.) 10 Installing and using webapp.secure

Chapter 6. Security Data security is achieved when using the webscurity webapp.secure client for Linux on System z. webapp.secure protects all elements of the web environment including operating system, HTTP daemon, development and deployment framework, and DBMS. It also ensures that web sites, their applications, and their associated databases are accessed and used exactly as intended, with a positive model, by enforcing web site guidelines, rules and policy. Web site policy is automatically secured after webapp.secure maps the web application business logic, including vulnerabilities (for example legacy and new application software), upon installation and autonomically derives and updates policy as content exits the server. webapp.secure is a web application firewall, residing in the DMZ between the standard firewall and the Linux web server, and protects against attacks seeking to exploit software vulnerabilities through: v SQL injection, v Cross-site scripting, v Hidden field manipulation, v Cookie poisoning, v Stealth commanding, v Forceful browsing, v Buffer overruns, and v URL parameter tampering. Copyright IBM Corp. 2006 11

12 Installing and using webapp.secure

Chapter 7. Data integrity considerations Ensuring data integrity between the webscurity webapp.secure client for Linux on System z and z/os. Data integrity is automatically assured by validation with web site policy when the HTTP stream passes through a standard firewall, and autonomically upon exit from the web server. Copyright IBM Corp. 2006 13

14 Installing and using webapp.secure

Chapter 8. Tuning Tuning the webscurity webapp.secure client for Linux on System z. Tuning on z/os is not applicable; all tuning is performed on Linux. The parameters which can be modified to adjust the performance of webapp.secure for Linux on System z are: <max-connections></max-connections> The maximum number of simultaneous client connections that will be served. Once the threshold is reached the operating system s listen queue will be used. <max-listen-queue></max-listen-queue> The maximum number of pending connections that will be served from the operating system s listen queue. Copyright IBM Corp. 2006 15

16 Installing and using webapp.secure

Chapter 9. Service and upgrade Migrating to the latest version of the webscurity webapp.secure client for Linux on System z. This will normally be performed by downloading and installing the latest RPM from webscurity as described in Chapter 3, Installation, on page 5. Installation will replace the executable /usr/local/wa/bin/wa executable with the latest webapp.secure version (currently version 4.0). The tasks to perform are: 1. Shut down webapp.secure, 2. Copy the executable, 3. Start webapp.secure. Obtaining updates Obtaining fixes to the current release of the webscurity webapp.secure client, and acquiring a new release The latest version of the webscurity webapp.secure client can be downloaded from http://www.webscurity.com/download.htm Copyright IBM Corp. 2006 17

18 Installing and using webapp.secure

Appendix. Notices This information was developed for products and services offered in the U.S.A. IBM may not offer the products, services, or features discussed in this document in other countries. Consult your local IBM representative for information on the products and services currently available in your area. Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM product, program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any IBM intellectual property right may be used instead. However, it is the user s responsibility to evaluate and verify the operation of any non-ibm product, program, or service. IBM may have patents or pending patent applications covering subject matter described in this document. The furnishing of this document does not grant you any license to these patents. You can send license inquiries, in writing, to: IBM Director of Licensing IBM Corporation North Castle Drive Armonk, NY 10504-1785 U.S.A. For license inquiries regarding double-byte (DBCS) information, contact the IBM Intellectual Property Department in your country or send inquiries, in writing, to: IBM World Trade Asia Corporation Licensing 2-31 Roppongi 3-chome, Minato-ku Tokyo 106-0032, Japan The following paragraph does not apply to the United Kingdom or any other country where such provisions are inconsistent with local law: INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS PUBLICATION AS IS WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or implied warranties in certain transactions, therefore, this statement may not apply to you. This information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice. Any references in this information to non-ibm Web sites are provided for convenience only and do not in any manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the materials for this IBM product and use of those Web sites is at your own risk. IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation to you. Copyright IBM Corp. 2006 19

Licensees of this program who wish to have information about it for the purpose of enabling: (i) the exchange of information between independently created programs and other programs (including this one) and (ii) the mutual use of the information which has been exchanged, should contact: IBM Corporation Software Interoperability Coordinator, Department 49XA 3605 Highway 52 N Rochester, MN 55901 U.S.A. Such information may be available, subject to appropriate terms and conditions, including in some cases, payment of a fee. The licensed program described in this information and all licensed material available for it are provided by IBM under terms of the IBM Customer Agreement, IBM International Program License Agreement, or any equivalent agreement between us. Any performance data contained herein was determined in a controlled environment. Therefore, the results obtained in other operating environments may vary significantly. Some measurements may have been made on development-level systems and there is no guarantee that these measurements will be the same on generally available systems. Furthermore, some measurements may have been estimated through extrapolation. Actual results may vary. Users of this document should verify the applicable data for their specific environment. Information concerning non-ibm products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products and cannot confirm the accuracy of performance, compatibility or any other claims related to non-ibm products. Questions on the capabilities of non-ibm products should be addressed to the suppliers of those products. All statements regarding IBM s future direction or intent are subject to change or withdrawal without notice, and represent goals and objectives only. This information is for planning purposes only. The information herein is subject to change before the products described become available. This information contains examples of data and reports used in daily business operations. To illustrate them as completely as possible, the examples include the names of individuals, companies, brands, and products. All of these names are fictitious and any similarity to the names and addresses used by an actual business enterprise is entirely coincidental. If you are viewing this information softcopy, the photographs and color illustrations may not appear. Trademarks The following terms are trademarks of International Business Machines Corporation in the United States, other countries, or both: HiperSockets IBM System z 20 Installing and using webapp.secure

WebSphere z/os z/vm All Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States, other countries, or both. Linux is a trademark of Linus Torvalds in the United States, other countries, or both. UNIX is a registered trademark of The Open Group in the United States and other countries. webscurity inc. and webapp.secure are trademarks of webscurity Inc. in the United States, other countries, or both. Other company, product, or service names may be trademarks or service marks of others. Appendix. Notices 21

22 Installing and using webapp.secure

Readers Comments We d Like to Hear from You Linux Utilities for IBM System z Installing and using the webscurity webapp.secure client Publication No. SC33-8322-00 Overall, how satisfied are you with the information in this book? Very Satisfied Satisfied Neutral Dissatisfied Very Dissatisfied Overall satisfaction h h h h h How satisfied are you that the information in this book is: Very Satisfied Satisfied Neutral Dissatisfied Very Dissatisfied Accurate h h h h h Complete h h h h h Easy to find h h h h h Easy to understand h h h h h Well organized h h h h h Applicable to your tasks h h h h h Please tell us how we can improve this book: Thank you for your responses. May we contact you? h Yes h No When you send comments to IBM, you grant IBM a nonexclusive right to use or distribute your comments in any way it believes appropriate without incurring any obligation to you. IBM or any other organizations will only use the personal information that you supply to contact you about the issues that you state on this form. Name Address Company or Organization Phone No.

Readers Comments We d Like to Hear from You SC33-8322-00 SC33-8322-00 Fold and Tape Please do not staple Fold and Tape IBM Deutschland Entwicklung GmbH Information Development Department 3248 Schoenaicher Strasse 220 71032 Boeblingen Germany PLACE POSTAGE STAMP HERE Fold and Tape Please do not staple Fold and Tape Cut or Fold Along Line Cut or Fold Along Line

SC33-8322-00